
Secret Private Quiz
Authored by ASHLEY TRIVITT
Other
Professional Development
Used 18+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When any entity assess compliance with the security requirements of NIST SP 800-171, they must use:
The NIST SP 800-171A procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-88 Revision 1 procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-53B procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-171 Revision 2 procedures to evaluate the effectiveness of the tested controls
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Certified Assessors will review information and evidence to independently verify that:
The contractor is aware of the objectives of the required practices
The contractor meets the stated assessment objectives for all the required practices
The contractor has implemented all the required controls
There is an action plan in place to implement all the required practices
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
PKI stands for:
Public Key Information
Public Key Infrastructure
Performance Key Indicator
Process Key Indicator
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The Property that preserves authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information is called:
Security
Privacy
Integrity
Confidentiality
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The application of an assessment procedure to a security requirement produces:
Assessment findings
All of these
Risk Mitigations
Remediation Plans
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Security functions include:
Employee vetting
Establishing System Accounts
Performance Review
Communication with regulators
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
To document implementation of NIST SP 800-171, the contractor must develop, document, and periodically update a system security plan that describes:
All of these
System environments of operation
How security requirements are implemented
System boundaries
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?